Risk

8/28/2018
10:45 AM
50%
50%

Polish Parliament Enacts National Cybersecurity System

The system classifies security incidents and splits national incident response into three separate teams.

The Parliament of Poland today passed into law a new act that will fully implement the NIS Directive, the European Union's directive on security of network and information systems.

Poland's goal for its new national cybersecurity system is to ensure security for information systems throughout the country. The system comprises several moving parts, all in different sectors and all of which are working together to improve security. Entities include service operators in critical industries (energy, transport, healthcare); digital service providers; computer security incident response teams (CSIRTs); and a government body appointed by the prime minister focused on cybersecurity policies.

The system also includes an advisory cybersecurity council, which operates alongside the Council of Ministers, to guide security-related matters and streamline the exchange of information on security incidents with other EU nations. Another entity includes different companies providing security services and handling incidents in their networks.

In addition, the act splits incident response for cyberattacks in Poland's cyberspace among three incident response teams. One is organized within the Internal Security Agency, one is within the Research and Academic Computer Network (NASK), and one is under the Ministry of National Security.

The EU NIS Directive was created to secure network and information systems across the European Union. Its regulations apply to operators of essential services established within the EU and digital service providers offering services to people in the region. It was implemented into UK law in May 2018.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Now, we come here to play Paw-ke Man Go!"
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.